IDS-ready Implementation Concept

Following the IDS certification criteria, an IDS Connector has to provide certain software criteria.


The Dataspace Connector is “IDS-ready” approved since 03.12.2020, for the certification level base (+ usage control). In the table below is an overview of all criteria for the base profile and whether it is already implemented or not.

DSC No. Title
x COM 01 Protected connection
x COM 02 Mutual authentication
x COM 03 State of the art cryptography
x USC 01 Definition of usage policies
x USC 02 Sending of usage policies
x USC 03 Usage policy enforcement
x INF 01 Self-Description (at Connector)
x INF 02 Self-Description (at Broker)
x INF 03 Self-Description content
x INF 04 Self-Description evaluation
x INF 05 Dynamic attribute tokens
x IAM 01 Connector identifier
x IAM 02 Time Service
x IAM 03 Online certificate status check
x IAM 04 Attestation of dynamic attributes
- BRK 01 Broker service inquiries
x BRK 02 Broker registration
x BRK 03 Broker registration update
- OS 01 Container support
- APS 01 App signature
- APS 02 App signature verification
- APS 05 App installation
- APS 06 App Store
- AUD 01 Access control logging
- AUD 02 Data access logging
- AUD 03 Configuration changes logging
x CR 1.1 Human user identification and authentication
- CR 1.1 (1) Unique identification and authentication
x CR 1.2 Software process and device identification and authentication
x CR 1.2 (1) Unique identification and authentication
- CR 1.3 Account management
- CR 1.4 Identifier management
- CR 1.5 Authenticator management
- CR 1.7 Strength of password-based authentication
- CR 1.8 Public key infrastructure certificates
- CR 1.9 Strength of public key-based authentication
x CR 1.10 Authenticator feedback
- CR 1.11 Unsuccessful login attempts
- CR 1.12 System use notification
- CR 1.14 Strength of symmetric key-based authentication
x CR 2.1 Authorization enforcement
- CR 2.2 Wireless use control
- CR 2.5 Session lock
- CR 2.8 Auditable events
- CR 2.9 Audit storage capacity
- CR 2.10 Response to audit processing failures
x CR 2.11 Timestamps
- CR 2.12 Non-repudiation
x CR 3.1 Communication integrity
x CR 3.1 (1) Communication authentication
- CR 3.3 Security functionality verification
- CR 3.4 Software and information integrity
- CR 3.5 Input validation
- CR 3.6 Deterministic output
x CR 3.7 Error handling
- CR 3.8 Session integrity
x CR 4.1 Information confidentiality
- CR 4.2 (1) Erase of shared memory resources
x CR 4.3 Use of cryptography
- CR 5.1 Network segmentation
- CR 6.1 Audit log accessibility
- CR 7.1 Denial of service protection
- CR 7.2 Resource management
- CR 7.3 Control system backup
- CR 7.4 Control system recovery and reconstitution
- CR 7.6 Network and security configuration settings
x CR 7.7 Least functionality
- SAR 2.4 Mobile code
- SAR 2.4 (1) Mobile code integrity check
- SAR 2.4 (1) Protection from malicious code
- NDR 1.6 Wireless Access Management
- NDR 1.13 Access via untrusted networks
- NDR 2.4 Mobile code
- NDR 3.2 Protection from malicious code
- NDR 3.10 Support for updates
- NDR 3.14 Integrity of the boot process
- NDR 5.2 Zone boundary protection
- NDR 5.3 General purpose, person-to-person communication restrictions
- D_AD.1 Secure initialisation
- D_AD.2 Tamper protection
- D_AD.3 Security-enforcing mechanisms
x D_IS.1 Interface purpose and usage
x D_IS.2 Interface parameters
x D_DD.1 Subsystem structure
- G_AP.1 Acceptance procedures
x G_AP.2 Installation procedures
x G_OG.1 Interface usage for each user role
- G_OG.2 Possible modes of operation
x S_CM.1 Unique component reference
x S_CM.2 Consistent usage of component reference
- S_CM.6 (1) Configuration list content (1)
- S_CM.7 Unique identification based on configuration list
- S_CM.8 Developer Information
- S_DL.1 Secure delivery
- S_FR.1 Tracking of reported security flaws
- S_FR.2 Security flaw description
- S_FR.3 Status of corrective measures
x T_CA.1 Test coverage analysis
- T_CA.2 Test procedures for subsystems
- T_TD.1 Test documentation
- T_TD.2 Test configuration
- T_TD.3 Ordering Dependencies